CIS 210 FINAL EXAM
CIS 210 Final Exam
1.
When determining
outsourcing fees, a ____ uses a set fee based on a specified level of service
and user support.
2.
Building an
application in a ____ environment can offer greater benefits, and sometimes
greater risks, compared to a traditional environment.
3.
Some firms offer
____, which provide powerful Web-based support for transactions such as order
processing, billing, and customer relationship management.
4.
A(n) ____ is a
firm that delivers a software application, or access to an application, by
charging a usage or subscription fee.
5.
Microsoft’s ____
is one of the major Web-based development environments.
6.
A user ____
utilizes standard business software, such as Microsoft Word or Microsoft Excel,
which has been configured in a specific manner to enhance user productivity.
7.
In a(n) ____
approach, the systems analyst defines the overall objectives of a system and
then breaks them down into subsystems and modules.
8.
In a structure
chart, a(n) ____ line, which has a diamond on one end, indicates that a control
module determines which subordinate modules will be invoked.
9.
In a structure
chart, a(n) ____ line, which has a diamond on one end, indicates that a control
module determines which subordinate modules will be invoked.
10.
In a structure
chart, a curved arrow represents a ____, which indicates that one or more
modules are repeated.
11.
____ measures a
module’s scope and processing characteristics.
12.
A module that
performs a single function or task has a high degree of ____, which is
desirable.
13.
Many database
programs generate ____, which is a language that allows PC client workstations
to communicate with servers and mainframe computers.
14.
The complete
definition of a database, including descriptions of all fields, tables, and
relationships, is called a(n) ____.
15.
In a
file-oriented information system, a security file ____.
16.
Any field that
is not a primary key or a candidate key is called a ____ key.
17.
A data ____,
which is a framework for organizing and storing data, consists of one or more
files or tables.
18.
A(n) ____, which
is used to access stored data, allows a user to specify a task without
specifying how the task will be accomplished.
19.
When a primary
key combines two or more fields, it is called any of the following EXCEPT a
____ key.
20.
A ____ report is
a type of detail report in which a control break causes specific actions, such
as printing subtotals for a group of records.
21.
____ describes
the relationship between computers and the people who use them to perform
business-related tasks.
22.
Interface
designers can obtain data, called ____ metrics, by using software that can
record and measure user interaction with a system.
23.
Initial screen
designs can be presented to users in the form of a(n) ____, which is a sketch
that shows the general screen layout and design.
24.
A(n) ____
produces one or more lines of output for each record processed.
25.
Printed output
is used in ____ documents, which are output documents that are later entered
back into the same or another information system.
26.
The ____ is a
control feature at the top of a data entry screen that displays the main menu
options.
27.
A ____ resembles
a circle of computers that communicate with each other.
28.
When developing
e-business systems, an in-house solution usually requires a ____ for a company
that must adapt quickly in a dynamic e-commerce environment.
29.
In a
client/server architecture, just as processing can be done at various places,
data can be stored in more than one location using a(n) ____.
30.
____ is the
measure of a system’s ability to expand, change, or downsize easily to meet the
changing needs of a business enterprise.
31.
A disadvantage
of a bus network is that ____.
32.
____ describes
how data actually moves from an application on one computer to an application
on another networked computer.
33.
In all cases, a
network must use a ____, which is a set of standards that govern network data
transmission.
34.
If significant
changes take place in an existing system or if a new version is released, the
IT department might develop a ____.
35. Adaptive maintenance
____.
36. Perfective maintenance
____.
37.
Perfective maintenance
usually is cost effective ____ the system’s operational life.
38.
The ____
documents a system at the end of the design phase, identifies any changes since
the beginning of the project, and includes testing and verification of all
system requirements and features.
39.
In a typical
system, the initial version of the system is 1.0, and the release that includes
the first set of maintenance changes is version ____.
40.
____ expenses
vary significantly during a system’s operational life and include spending to support
maintenance activities.
No comments:
Post a Comment